GLPI is a free asset and IT management software package. Starting in version 9.3.0 and prior to version 10.0.17, an authenticated user can use the API to take control of any user that have the same or a lower level of privileges. Version 10.0.17 contains a patch for this issue.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Feb 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Glpi-project
Glpi-project glpi |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* | |
Vendors & Products |
Glpi-project
Glpi-project glpi |
|
Metrics |
cvssV3_1
|
Wed, 11 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GLPI is a free asset and IT management software package. Starting in version 9.3.0 and prior to version 10.0.17, an authenticated user can use the API to take control of any user that have the same or a lower level of privileges. Version 10.0.17 contains a patch. | GLPI is a free asset and IT management software package. Starting in version 9.3.0 and prior to version 10.0.17, an authenticated user can use the API to take control of any user that have the same or a lower level of privileges. Version 10.0.17 contains a patch for this issue. |
Metrics |
ssvc
|
Wed, 11 Dec 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GLPI is a free asset and IT management software package. Starting in version 9.3.0 and prior to version 10.0.17, an authenticated user can use the API to take control of any user that have the same or a lower level of privileges. Version 10.0.17 contains a patch. | |
Title | GLPI vulnerable to account takeover without privilege escalation through the API | |
Weaknesses | CWE-284 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-11T17:10:22.033Z
Reserved: 2024-09-30T21:28:53.230Z
Link: CVE-2024-47758

Updated: 2024-12-11T17:10:14.276Z

Status : Analyzed
Published: 2024-12-11T16:15:11.947
Modified: 2025-02-06T15:21:12.747
Link: CVE-2024-47758

No data.